Advanced
Insert title here
If you want submit your manuscript to this journal, click the journal title.
Journal Info
Aims&Scope
Editorial
For Author
Current
Archive
 Archive
Volume 8(5); May 2014
1.
Two-Tier Interference Elimination for Femtocells Based on Cognitive Radio Centralized Spectrum Management

Yi, Leng-Gan;Lu, Yi-Min;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1514-1531
2.
A Generalized Markovian Based Framework for Dynamic Spectrum Access in Cognitive Radios

Muthumeenakshi, K.;Radha, S.;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1532-1553
3.
Service Scheduling in Cloud Computing based on Queuing Game Model

Lin, Fuhong;Zhou, Xianwei;Huang, Daochao;Song, Wei;Han, Dongsheng;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1554-1566
4.
Efficient Virtual Machine Resource Management for Media Cloud Computing

Hassan, Mohammad Mehedi;Song, Biao;Almogren, Ahmad;Hossain, M. Shamim;Alamri, Atif;Alnuem, Mohammed;Monowar, Muhammad Mostafa;Hossain, M. Anwar;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1567-1587
5.
Evolutionary Algorithm-based Space Diversity for Imperfect Channel Estimation

Ghadiri, Zienab Pouladmast;El-Saleh, Ayman A.;Vetharatnam, Gobi;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1588-1603
6.
RIX-MAC: An Energy-Efficient Receiver-Initiated Wakeup MAC Protocol for WSNs

Park, Inhye;Lee, Hyungkeun;Kang, Seokjoong;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1604-1617
7.
Avoiding Energy Holes Problem using Load Balancing Approach in Wireless Sensor Network

Bhagyalakshmi, Lakshminarayanan;Murugan, Krishanan;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1618-1637
8.
Sequential Optimization for Subcarrier Pairing and Power Allocation in CP-SC Cognitive Relay Systems

Liu, Hongwu;Jung, Jaijin;Kwak, Kyung Sup;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1638-1653
9.
Robust Design of Coordinated Set Planning with the Non-Ideal Channel

Dai, Jianxin;Liu, Shuai;Chen, Ming;Zhou, Jun;Qi, Jie;Liang, Jingwei;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1654-1675
10.
Image Retrieval Method Based on IPDSH and SRIP

Zhang, Xu;Guo, Baolong;Yan, Yunyi;Sun, Wei;Yi, Meng;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1676-1689
11.
Rapid Implementation of 3D Facial Reconstruction from a Single Image on an Android Mobile Device

Truong, Phuc Huu;Park, Chang-Woo;Lee, Minsik;Choi, Sang-Il;Ji, Sang-Hoon;Jeong, Gu-Min;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1690-1710
12.
Disjoint Particle Filter to Track Multiple Objects in Real-time

Chai, YoungJoon;Hong, Hyunki;Kim, TaeYong;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1711-1725
13.
A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1726-1743
14.
An Enhanced Remote Data Checking Scheme for Dynamic Updates

Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1744-1765
15.
Finger Vein Recognition Using Generalized Local Line Binary Pattern

Lu, Yu;Yoon, Sook;Xie, Shan Juan;Yang, Jucheng;Wang, Zhihui;Park, Dong Sun;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1766-1784
16.
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations

Chan, Chi-Shiang;Chou, Yung-Chen;Chen, Yi-Hui;Tsai, Yuan-Yu;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1785-1800
17.
HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets

Kim, Sung-Jin;Lee, Sungryoul;Bae, Byungchul;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1801-1816
18.
Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 5, 2014, pp. 1817-1827